Science, Computers & Technology Military

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Department of Defense Issues New Cybersecurity Rules for Defense Agencies That Use Contractors and Cloud Services to Hold...

The U.S. Department of Defense (DOD) recently published an interim rule amending the Defense Federal Acquisition Regulation Supplement (DFARS).1 The interim rule, effective August 26, 2015, focuses on two issues. First, the...more

Now to End of 2015 – What to Expect?

Funding Crisis Averted & New Leadership in the House: A week ago no one could have predicted that the biggest story in Washington this week would not be the last minute avoidance of a government shutdown by passage of a...more

Project CAMERASHY Details Cyberespionage By China’s Military

In a story reminiscent of a Tom Clancy plot, the Wall Street Journal reported last Thursday on “meticulously documented” cyberespionage conducted by China’s People’s Liberation Army (“PLA”) Unit 78020 to further strategic...more

DOD Adopts Interim Cyber Rules As Claims of Chinese Cyber Attacks Continue

U.S. officials have blamed Chinese government-backed attackers for many of the recent cyber attacks on U.S. government and business computer networks: “Researchers and government officials have determined that the Chinese...more

SCRA Compliance, Cybersecurity, and Responsible Innovation Remain Top Priorities at OCC

On August 31, Grovetta Gardineer, the OCC’s Deputy Comptroller for Compliance Operations and Policy, delivered remarks at the Association of Military Bankers of America annual workshop in Leesburg, VA. Throughout her...more

DoD New Cyber Security Reporting Rules for Contractors

In a move that highlights the changing winds of federal cybersecurity policy, the Department of Defense (“DoD”) has issued an interim Rule (“Rule”) that imposes new security and reporting requirements on federal contractors,...more

DoD's New Cybersecurity and Cloud Standards and Reporting Requirements

The Department of Defense (DoD) released interim rules implementing provisions of the 2013 and 2015 National Defense Authorization Acts. The rules, released on Aug. 26, 2015, are effective immediately and establish the...more

Defense Department Issues Interim Rule Requiring Contractor and Subcontractor Reporting of Cyber Incidents

On August 26, 2015, the Department of Defense (DoD) published a long-awaited Interim Rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) to require “rapid” reporting of “cyber incidents” that result in...more

The shifting sands of cybersecurity: DOD's interim rule further burdens contractors

The Department of Defense (DOD) earlier today issued an interim rule, effective immediately, that significantly increases existing cybersecurity requirements for DOD contractors. The requirements in the interim rule, have...more

[Event] The Aerospace & Defense Forum: SPAWAR: The Navy's Information Dominance Systems Command- July 28, 5:30pm - San Diego, CA

Guest Presenter: Mr. Patrick M. Sullivan, Executive Director, Space and Naval Warfare Systems Command - What areas are most important and likely to be funded in the near term? - How does SPAWAR view sequestration...more

Army National Guard announces data breach affecting both current and former members

On July 10, 2015, the Army National Guard announced a breach of its current and former members’ personal information, dating back to 2004. The breach occurred when files containing personal information were accidentally...more

Republican Senators Sought To Tie Cybersecurity Measure To Defense Bill

In the wake of the recent public disclosure of the massive breach into the Office of Personnel Management compromising the personal information of approximately 4 million individuals, Senators were hoping to tie a...more

United States And Japan Pledge Closer Cooperation In Cyber Defense Matters

On May 30, the United States-Japan Cyber Defense Policy Working Group (“CDPWG”) issued a joint statement outlining increased cooperation between the two countries in the cyber realm. The CDPWG was founded in October 2013 to...more

State and Commerce Departments Publish Next Set of Proposed Export Control Reform Rules: Fire Control, Range Finder, Optical...

In This Issue: - Export Control Reform Initiative - DDTC Proposed Rule - BIS Proposed Rule - For More Information - Excerpt from Export Control Reform Initiative: By way of background, the Export...more

Weekly Update Newsletter - June 2015

GOVERNMENT CONTRACTS - DoD, GSA, and NASA Issue a Proposed Rule to Amend FAR: Consolidation and Bundling of Contract Requirements - The Department of Defense (DoD), General Services Administration (GSA), and...more

The New Space Race: Protecting Trade Secrets on the Final Frontier

Space: The final frontier. For millennia, people have wanted to explore the great unknown of outer space, and series like Star Trek and Star Wars continue to our fuel our fantasies about what lies beyond our stratosphere. ...more

Senator Asks Department of Veteran Affairs to Break Patents on Hepatitis C Drugs

Last week, in a letter addressed to the Secretary of the U.S. Department of Veteran Affairs, Senator Bernard Sanders (I-VT) urged Secretary Robert McDonald to use his authority as Secretary "to break the patents on Hepatitis...more

Washington Healthcare Update

This Week: Health Subcommittee Advances 21st Century Cures, Full Committee Action Scheduled…Senate Finance Committee Hearing: Chair Hatch to Launch New Initiative on Improving Chronic Care for Medicare Patients…Hawaii’s...more

Weekly Update Newsletter - May 2015 #3

GOVERNMENT CONTRACTS - DoD Issues January and February 2015 Contract Data Contract Reporting Scorecards - The Department of Defense (DoD) issued the contract data and reporting scorecard metrics for January and...more

DHS Breaks New Ground With Issuance of SAFETY Act Certifications for Advanced Cybersecurity Defense Systems

FireEye’s MVX and DTI Technologies become the first cybersecurity products to earn certification as “Qualified Anti-Terrorism Technologies.” The Department of Homeland Security (DHS) crossed an important barrier in...more

GAO Upholds Agency Prohibition of Having Bid Prep Consultants Prepare Proposal

Are bid preparation consultants good or bad for the competitive procurement system? Contractors have argued about this for years. GAO recently upheld a solicitation provision forbidding the use of consultants to...more

New Cyber Strategy Issued By Pentagon

In a speech at Stanford University on April 23, 2015, Department of Defense (“DoD” or the “Pentagon”) Secretary Ash Carter unveiled the Pentagon’s new cyber strategy (the “Strategy”) and called on the technology sector to...more

Weekly Update Newsletter - May 2015

SMALL BUSINESS ADMINISTRATION - SBA Issues Proposed Rule to Amend Women-Owned Small Business Federal Contract Program - The U.S. Small Business Administration (SBA) issued a proposed rule to amend its...more

Secretary Of Homeland Security Seeks Cooperation Between Public And Private Sectors In Fight Against Cybercriminals

On April 21, 2015, Department of Homeland Security (“DHS”) Secretary Jeh Johnson spoke at the annual RSA Conference 2015. In his remarks, Johnson explained that, while the DHS was established primarily to focus on...more

Reed Smith's Government Contracts Weekly Rundown - April 2015 #4

Here is a rundown of last week’s top developments related to government contracts to get you back on track and ready for this week....more

258 Results
View per page
Page: of 11

Follow Science, Computers & Technology Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.